Jump to content

thatguy

Members
  • Posts

    9
  • Joined

  • Last visited

About thatguy

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    USA

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. So after I finally got a tech remoted into the original workstation experiencing the problem, I was told this is a new issue introduced with v6.6.2046. It's seemingly caused by a permission issue when running a scheduled update under the system account. The tech overrode the default policy and changed the Update->Profile->Connect To LAN As setting to Current user, which allowed the scheduled update to run; however, this was done under a domain admin account. By this point, the user had been kicked off her machine for over an hour and I couldn't offer the tech any more time to test (for example, if the update would run under a standard user account). Silly me for thinking ESET would have a testing lab to use for this purpose. So for anyone else dealing with this issue, it sounds like it's a new bug. Hooray for quality control!
  2. Hello -- We've recently updated to Endpoint Antivirus 6.6.2046. Since then, a workstation has been seeing notifications saying "Failed to rename file." That's all the info it offers. thanks.. The workstation event log (in Tools->Log files->Events) shows the same vague and unhelpful message. I tried uninstalling, which was a chore in itself... I had to use the manual CLI uninstaller because the push uninstall failed with no explanation, and uninstalling from Control Panel halted because "no password was specified". I finally got Antivirus gone, leaving the Agent installed, and reinstalled Antivirus from ERA. The silence lasted for about 2hrs, and then the notification popped up again. I can't see any mention of the error in ERA. Has anyone seen this? Any thoughts on a cause or next step to troubleshoot? Thanks
  3. Is UAC a necessity to add client-level exclusions?
  4. That setting Is enabled.. but we also disable UAC via Windows Group Policy. I tried disabling that setting in the policy, as well as unlocking it completely, but still no good. When I go into the Exclusion list via the UI->Setup->Real-time file...Edit exclusions, it asks for the ESET admin password and I can edit exclusions, but when I go back in, all paths are gone. When I go into the Exclusion list via F5/Advanced Setup, it asks for the ESET admin password and I can edit exclusions. This way, however, when I click Ok in the Advanced Setup window, it says "An error occurred while saving settings. Please make sure you that you have permissions to change settings" and I can only Cancel from that window. Is UAC a necessity to add client-level exclusions? Thanks
  5. Hello -- I have a workstation running Endpoint AV 6.5.2094.0, with ERA pushing out policies. For some reason (I'm assuming an auto-update changed something), a networked device is no longer able to connect into this machine; however, when I disable the AV, everything works. I'm trying to exclude the listener program folder from scanning. That used to be locked from the policy, so I unlocked it; it's now editable on the workstation. I go into Real-time file system protection/Edit exclusions.. I Add the path, click Ok. The correct path is shown in the Exclusions list.. I click Ok to close that window. BUT, when I go back into the Exclusions window, the list is clear - no paths shown! What could I be missing here? Thanks.
  6. Thank you for the replies. If it's now required to have LiveGrid enabled (which, essentially it is, otherwise users will be threatened with warnings and IT Depts will be inundated with calls about those warnings), then what's the point of having the option to disable LiveGrid anymore? The other two options [regarding submitting statistics and samples] are obviously helpful. With those two options Disabled/Off (but LiveGrid enabled), is it safe to say that we will be 100% HIPAA(et al)-compliant? Meaning there is NO possibility that ANY readable file would ever get sent out from our network (infected, suspicious, or otherwise)?
  7. Hello -- I just updated a couple test machines to EndPoint Antivirus v6.5.2094.0 (from 6.4.2014) and File Security v6.5.12007, and suddenly they're all complaining about LiveGrid being disabled. I have that disabled by global policy because a) we're a healthcare facility and need to protect patient info at all costs, and b) I've never been able to find or get a clear, concise, and technical answer about what exactly is sent outside my network. I'd like to avoid the tedium of monitoring network traffic to and from external ESET servers, so if anyone could offer details, it would be much appreciated.. What exactly gets transmitted? how often? is it encrypted and how? is any of that data stored on ESET (or others') servers? why? for how long? (these questions are moot if there is NO chance of personally identifiable info is sent).. what gets sent back? etc etc etc.. I'm looking for exact details. And a related question, why the sudden change to enforce LiveGrid participation? Thanks.
×
×
  • Create New...